CVE-2023-53231Linux vulnerability

6 documents6 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 92.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 15

Description

In the Linux kernel, the following vulnerability has been resolved: erofs: Fix detection of atomic context Current check for atomic context is not sufficient as z_erofs_decompressqueue_endio can be called under rcu lock from blk_mq_flush_plug_list(). See the stacktrace [1] In such case we should hand off the decompression work for async processing rather than trying to do sync decompression in current context. Patch fixes the detection by checking for rcu_read_lock_any_held() and while at it

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages5 packages

NVDlinux/linux_kernel4.196.4.7
Debianlinux/linux_kernel< 6.4.11-1+1
CVEListV5linux/linuxaea1286dcbbb87cf33595c2ac8b153c29a4611cb597fb60c75132719687e173b75cab8f6eb1ca657+2
debiandebian/linux< linux 6.4.11-1 (forky)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53231: In the Linux kernel, the following vulnerability has been resolved: erofs: Fix detection of atomic context Current check for atomic context is not suf2025-09-15
GHSA
GHSA-72rq-7p7f-9f9j: In the Linux kernel, the following vulnerability has been resolved: erofs: Fix detection of atomic context Current check for atomic context is not s2025-09-15

📋Vendor Advisories

3
Red Hat
kernel: erofs: Fix detection of atomic context2025-09-15
Microsoft
erofs: Fix detection of atomic context2025-09-09
Debian
CVE-2023-53231: linux - In the Linux kernel, the following vulnerability has been resolved: erofs: Fix ...2023
CVE-2023-53231 — Linux vulnerability | cvebase